Design And Construction Of A Smart Access Door Control System Using RFID And Password

Overview

Security system solutions for strategic facilities are critical to prevent the intrusion of unauthorized persons, however there are many types of automatic access control systems which are expensive and complicated to use. This paper focuses on the development of a simple security system that combines Radio Frequency Identification and password to provide a low cost and formidable access control for entrances. The system is built on ATMEGA8 Microcontroller that directs the RFID reader to scan and authenticate users’ identification tag and further request for password through a keypad before activating a motor to grant access. The Microcontroller which also controls a liquid crystal display was programmed using Microbasic language; the data of identification tags and password were stored in its database. The RFID reader was able to scan tags within 25cm range in two seconds, and open a prototype door within 3 seconds of entering the correct password. The motor closes the door after a preset 5 seconds delay. The system was implemented for 12 users, the components used are cheap and available; the system is formidable and reliable.

TABLE OF CONTENTS

 TITLE PAGE

APPROVAL PAGE

DEDICATION

ACKNOWELDGEMENT

ABSTRACT

TABLE OF CONTENT

CHAPTER ONE

  • INTRODUCTION
  • PROBLEM STATEMENT
  • AIM OF THE PROJECT
  • OBJECTIVE OF THE PROJECT
  • SIGNIFICANCE OF THE PROJECT
  • PURPOSE OF THE PROJECT
  • LIMITATION OF THE PROJECT
  • APPLICATION OF THE PROJECT
  • PROJECT ORGANISATION

CHAPTER TWO

LITERATURE REVIEW

2.0      LITERATURE REVIEW

2.1      REVIEW OF THE STUDY

2.2     OVERVIEW OF RFID

2.3     REVIEW OF RELATED

CHAPTER THREE

3.0      METHODOLOGY

3.1      INTRODUCTION

3.2      BLOCK DIAGRAM OF THE SYSTEM

3.3      SYSTEM HARDWARE DESCRIPTION

3.4      CIRCUIT DESCRIPTION

CHAPTER FOUR

4.0       RESULT AND DISCUSSION

CHAPTER FIVE

  • CONCLUSIONS
  • RECOMMENDATION
  • REFERENCES

CHAPTER ONE

1.0                                                        INTRODUCTION

1.1                                         BACKGROUND OF THE PROJECT

Security systems are very important in the protection of lives, premises and valuable resources. There are many advanced methods of providing security that have been developed and are in use in the last few decades, one important area is the security system required for strategic applications such as military bases, research centers, laboratories and other critical facilities. Such advanced security systems are complex and expensive making them implementable in high end applications only. However, with recent progress in technology and the growing need for increased security in civilian and other applications, many low cost solutions for security system have emerged with a range of degrees of sophistication, complexity and cost (Gill, Yang, Yao, and Lu, 2009).

Different access control automation techniques are available to reduce the system complexity and lower costs, these systems do not incorporate complex and expensive components. A home gateway is implemented to facilitate the interoperability between heterogeneous networks and provide a consistent interface, regardless of the accessing device (Udaya, Murty and Kurmar, 2013).

There is a wide range of Automatic Identification (Auto-ID) systems for access control in use, these includes magnetic stripes, Optical Character Recognition (OCR), barcodes, biometrics, smart cards and Radio Frequency Identification (RFID). However, each of these technologies has their advantages and drawbacks. The OCR systems allow the use of manual and auto-identification simultaneously but the very high cost of the readers prevented its widespread use (Finkenzeller, 2003)

The use of barcodes is a cost-effective way for managing inventory, they have some disadvantages such as limited information-storing capacity; a strict line of sight requirement between the scanner and the barcode, which effectively prevents multiple barcodes to be processed simultaneously; limited data redundancy and error correction; and a lack of inbuilt data-security standards. The use of biometrics, such as fingerprinting, retina scans, iris scans, and voice recognition are strong identification solutions in automatic access control but these technologies are expensive and privacy invasive (Sweeney and Patrick, 2005).

Smart card and its derivatives such as memory card or microprocessor card solutions use standard credit-card sized plastic cards with an integral data storage system designed to make financial transactions secure and fast, but a with high cost of maintaining the reader (Goodrum, McLaren and Durfee, 2006). RFID tries to overcome the disadvantages of previous systems by improving the speed and accuracy of data collection and dissemination as well as reducing the overall cost. RFID systems rely on Radio Frequency to transmit a tag-specific unique serial number to a reader or interrogator (Amit and Berghel, 2011).

A RFID system is composed of three basic units, a transponder unit or tag with a unique identifier that facilitates auto-identification of any object to which the tag is attached, a reader unit or interrogator that manages the radio frequency communication with the tag and a middleware or reader interface layer, which is essentially a software that acts as an interface between the basic RFID hardware components, and the software application (Shoewu and Badejo, 2006).

There currently is not a definite industry standard for frequency, but the most common applications around the world use frequencies of 125 KHz and 13.56 MHz. There are three classes of the RFID tags; Active tags, Passive tags and Semi-Passive (Battery –Assisted Passive) tags. The Active tag has its own battery that is used to broadcast signals over great distances; it is usually bigger in size and capable of carrying more information. The Passive tag has no inbuilt power source, the signal from the RFID reader creates an electromagnetic field that powers the tag, and it is cheaper than the active tag. The Semi-Passive tag or Battery Assisted Passive tag (BAP) is equipped with an onboard battery that drives the chip’s circuitry but power for communication of the signal is derived from the reader’s electromagnetic field as in the case of passive tags (Gyanendra and Pawan, 2010).

The password identification system requires the user to enter a password (a set of numeric or alphanumeric characters) on a keypad which then grants access to the user if it matches the required characters residing on a database (Kyuhee and Mokdong, 2006).

The RFID system has its vulnerabilities such as card skimming and tag killing, other security issues are card spoofing, tag cloning and malwares (Amit and Berghel, 2011). This gave rise to the need for a simple and affordable system that will utilize the advantages of the RFID and also overcome its drawbacks; leading to the use of password identification in addition to the RFID for access control, this is the aim of this study.

1.2                                   PROBLEM STATEMENT

The need for having a constant home protection has always been there. But in the recent times, considering a dramatic rise in petty crimes like robbery and theft, the need has been more strongly felt to have a fool proof protection of the belongings and the family members. Home security has come a long way in the last few decades. It was in the hands of a guard who manually provided surveillance during nights in the earlier days, but it was not fool proof as it was only normal for him to have momentary lapse of concentration. This device brought solution to this need. It ensures adequate protection against intruders.

1.3                                        AIM OF THE PROJECT

The main aim of this project is to create a comfort in the minds of house owners when they out from their premises without much fear of intruder.

1.4                                             OBJECTIVE OF THE PROJECT

The main objective of the proposed system is to construct a secure access control system to control the entry of various items through a door or a passage using RFID  and biometric technology.

1.5                                         SIGNIFICANCE OF THE PROJECT

This device functions as an electronics watch dog. This device functions as a major security device  used in residential, commercial, industrial, and military properties for protection against burglary (theft) or property damage, as well as personal protection against intruders.

1.6                                              PURPOSE OF THE PROJECT

This project proposes the development of security system for form houses and residential houses.

1.7                                          APPLICATION OF THE PROJECT

This device can be used are as follows:

  1. Home Security Systems.
  2. Prisons Security.
  • Vehicle Security.
  1. Broadband alarm monitoring.
  2. Glass Break.
  3. Property Theft Alarm

1.7                                           LIMITATION OF THE PROJECT

  1. The given alarm system determines the presence of the intruder only, and does not determine how many persons are in there
  2. The alarm activates only when the person cuts through the line of the PIR sensor

1.8                                      SIGNIFICANCE OF THE PROJECT

  • The given system is handy and portable, and thus can be easily carried from one place to
  • The circuitry is not that complicated and thus can be easily
  • The given system sets off a powerful buzzer, and it is effective as any other alarm system available in the

1.9                                                  PROJECT MOTIVATION

Since innovation is so cutting-edge, one of a kind access control frameworks have turned out essential to win security dangers to different associations. Access control framework confines access to a property, a structure, or a space to approved people. In the field of data and protection security, door access control frameworks are assuming major indispensable jobs to shield associations. This is where everything is related with the framework, where anyone can get hold of information from wherever around the world. In this manner, hacking of one’s data is a noteworthy issue. On account of these perils, it is basic to have a type of individual recognizable proof (ID) to get to one’s own specific data. Security get to framework is exceptionally helpful to use at home, office and business structures. Every one of these years, different frameworks are acquainted with track the individual’s development. Among standard individual ID systems, secret key and ID card strategies are the most watched techniques. Be that as it may, it isn’t hard to hack password now and recognizable ID cards may get lost, henceforth making these strategies very sketchy. With the upgrade in the innovation, Framework Security is getting to be thought of significant worry in different associations and consequently advanced locks have turned into a significant piece of these security frameworks. There are numerous sorts of security frameworks that are accessible for security of our place. The main objective of this project was to ensure a proper security to building against theft or intruder.

1.10                                  PROJECT WORK ORGANISATION

The various stages involved in the development of this project have been properly put into five chapters to enhance comprehensive and concise reading. In this project thesis, the project is organized sequentially as follows:

Chapter one of this work is on the introduction to this study. In this chapter, the background, significance, objective limitation and problem of this study were discussed.

Chapter two is on literature review of the study. In this chapter, all the literature pertaining to this work was reviewed.

Chapter three is on design methodology. In this chapter all the method involved during the design and construction were discussed.

Chapter four is on testing analysis. All testing that result accurate functionality was analyzed.

Chapter five is on conclusion, recommendation and references.

Chapter Two: Literature Review

2.0 INTRODUCTION:

This chapter provides the background and context of the research problems, reviews the existing literature on the Design And Construction Of A Smart Access Door Control System Using RFID And Password, and acknowledges the contributions of scholars who have previously conducted similar research [REV65654] …

Document Information

    • Format: DOC/PDF
    • Title: Design And Construction Of A Smart Access Door Control System Using RFID And Password:

YOU MAY LOVE THESE (Recommended)

  • How to write the “Smart Waste Bin Using Arduino” Project

    To start a project on Smart Waste Bin Using Arduino, follow these guidelines: The main objective of the project is to design a smart dustbin which will help in keeping our environment clean and also eco friendly. Nowadays technologies are getting smarter day-by-day so, as to clean the environment we are designing a smart dustbin by using Arduino. This smart dustbin managem…

    45 Pages 1 - 5 Chapters 6,758 Words DOC/PDF Format Instant Download UPN65324

  • Techniques for writing the “Real Time School Bus Tracking System Using (RFID)” Project

    To develop a project on Real Time School Bus Tracking System Using (RFID), follow these approaches: In present time due to increase in number of kidnapping and road accident cases, parent always worry about their children. This paper proposes a SMS based solution to aid parent to track their children location in real time. The proposed system takes the advantage of the location services provide…

    35 Pages 1 - 5 Chapters 4,739 Words DOC/PDF Format Instant Download UPN64232

  • Writing strategies for the “Implementation Of A Smart IoT Based Surveillance Camera” Project

    To undertake a project on Implementation Of A Smart IoT Based Surveillance Camera, follow these effective ways: This work is on a smart IoT based surveillance camera using ATmega328. In recent times, we used surveillance cameras for monitoring and recording moments, but manual surveillance and real-time monitoring is one of the most important and challenging branches of computer vision, which has been wide…

    56 Pages 1 - 5 Chapters 8,289 Words DOC/PDF Format Instant Download UPN66483

  • Steps for writing the “Effect Of Poverty And Access To Health Care” Project

    To write a project on Effect Of Poverty And Access To Health Care, follow these structure: People in poor countries tend to have less access to health services than those in better-off countries, and within countries, the poor have less access to health services. This article documents disparities in access to health services in low- and middle-income countries (LMICs), using a framewo…

    47 Pages 1 - 5 Chapters 12,451 Words DOC/PDF Format Instant Download UPN75317

  • To carry out a project on Design And Implementation Of A Two Factor Authentication Login System Using One Time Password (OTP) With SMS, follow these effective methods: The paper examined the design and implementation of a two-factor authentication login system using OTP with SMS. The quest for the application of tighter security measures to web, desktop and mobile applications developed has been a major concern to a lot of people. Faced with the challenges of p…

    70 Pages 1 - 5 Chapters 7,536 Words DOC/PDF Format Instant Download UPN66849

  • To start a project on Design And Implementation Of A Smart Door Lock System Using Finger Print, follow these guidelines: Authentication plays a very critical role in security-related applications like e-commerce. There are a number of methods and techniques for accomplishing this key process. In this regard, biometrics is gaining increasing attention these days. Security systems, having realized the value of biomet…

    42 Pages 1 - 5 Chapters 5,726 Words DOC/PDF Format Instant Download UPN64799

  • Techniques for writing the “Design And Construction Of Automatic Smart Waste Bin” Project

    To develop a project on Design And Construction Of Automatic Smart Waste Bin, follow these approaches: The main objective of the project is to design a smart dustbin which will help in keeping our environment clean and also eco friendly. Nowadays technologies are getting smarter day-by-day so, as to clean the environment we are designing a smart dustbin by using Arduino. This smart dustbin managem…

    45 Pages 1 - 5 Chapters 6,761 Words DOC/PDF Format Instant Download UPN85748

  • Writing strategies for the “Design and Construction of A Smart Fan” Project

    To undertake a project on Design and Construction of A Smart Fan, follow these effective ways: A smart fan is designed with op-amp is quite useful for conference halls, auditoriums, cinema halls, and other commercial organizations where many people gathered together, and lot of fans are required at these places. Depending up on the weather condition, organizers of the above places are supp…

    60 Pages 1 - 5 Chapters 8,367 Words DOC/PDF Format Instant Download UPN65199

  • To write a project on Design And Construction Of A Smart Emergency Lighting System, follow these structure: This project work is on design and construction of a smart emergency light system. An automatic emergency light is an electronics device used in turning light ON during dark condition. Smart Emergency Light will turn on the Emergency light only during the Dark condition. Ordinary emergency light …

    66 Pages 1 - 5 Chapters 10,157 Words DOC/PDF Format Instant Download UPN66660

  • To carry out a project on Design And Construction Of A Password Based Security System, follow these effective methods: Traditional lock systems using mechanical lock and key mechanism are being replaced by new advanced techniques of locking system. These techniques are an integration of mechanical and electronic devices and highly intelligent. One of the prominent features of these innovative lock systems is thei…

    47 Pages 1 - 5 Chapters 6,016 Words DOC/PDF Format Instant Download UPN65946

Live Chat